CN106293962A - A kind of method and apparatus of calling system order - Google Patents

A kind of method and apparatus of calling system order Download PDF

Info

Publication number
CN106293962A
CN106293962A CN201610620579.0A CN201610620579A CN106293962A CN 106293962 A CN106293962 A CN 106293962A CN 201610620579 A CN201610620579 A CN 201610620579A CN 106293962 A CN106293962 A CN 106293962A
Authority
CN
China
Prior art keywords
application program
request message
service processes
sent
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610620579.0A
Other languages
Chinese (zh)
Other versions
CN106293962B (en
Inventor
覃淑蓉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Broadband Multimedia Technology Co Ltd
Original Assignee
Hisense Broadband Multimedia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Broadband Multimedia Technology Co Ltd filed Critical Hisense Broadband Multimedia Technology Co Ltd
Priority to CN201610620579.0A priority Critical patent/CN106293962B/en
Publication of CN106293962A publication Critical patent/CN106293962A/en
Application granted granted Critical
Publication of CN106293962B publication Critical patent/CN106293962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/544Buffers; Shared memory; Pipes

Abstract

The present embodiments relate to field of computer technology, the method and apparatus particularly relating to a kind of application call system command, including: the first application program obtains the second application program and accesses the request message of system command, then request message is sent to be positioned at the service processes of system core layer by the first application program, performed system call by service processes, and according to the mark of the second application program, execution result is returned to the second application program by service processes.Can be seen that, after first application program obtains the request message that the second application program accesses system command, request message can be sent to be positioned at the service processes of system core layer, by service processes, execution result is returned to the second application program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then make the second application program simplerization realizing various functional requirement when.

Description

A kind of method and apparatus of calling system order
Technical field
The present embodiments relate to field of computer technology, the method and apparatus particularly relating to a kind of calling system order.
Background technology
Android (Android) system is in the consideration of security of system, enters the application program operated in android system The fine granularity management of row authority and isolation, prevent generation and the abuse authority acquiring sensitive data of act in excess of authority, be i.e. normally applied Program only has APP (application) authority, and the application of relatively core can have System (system) authority, has the application of APP authority Program can only access file and the catalogue of oneself, it is impossible to accessing the data of system, the application program with System authority is permissible Create and delete file, access equipment etc. in systems.And the system command in android system needs have root authority Can perform, this results in Android application program and cannot use existing system command due to rights concerns base.
But, along with popularizing of Android intelligent terminal product, the function of Android application program is more and more abundanter, The demand of application program is also got more and more by user, and realizing various functional requirement when, usually because of the problem of authority Cause originally to become more to complicate by the function that existing system command realizes.
Summary of the invention
The embodiment of the present invention provides the method and apparatus of a kind of calling system order, in order to by application call system Order, thus application program simplerization realizing various functional requirement when.
The embodiment of the present invention provides a kind of method of application call system command, including:
First application program obtains the second application program and accesses the request message of system command, carries in described request message There are mark and the system call of the second application program of the second application program;
Described request message is sent to be positioned at the service processes of system core layer, described service by described first application program Process performs described system call, and according to the mark of described second application program, execution result is returned to described second Application program, described service processes is pre-set in system core layer.
The embodiment of the present invention also provides for the device of a kind of application call system command, including:
Acquisition module, accesses the request message of system command, takes in described request message for obtaining the second application program Mark and the system call of the second application program with the second application program;
Processing module, for described request message is sent to be positioned at the service processes of system core layer, described service into System call described in Cheng Zhihang, and according to the mark of described second application program, execution result is returned to described second should By program, described service processes is pre-set in system core layer.
The method and apparatus of a kind of application call system command that above-described embodiment provides, including: first first should Obtain the second application program by program and access the request message of system command, this request message carries the second application program Mark and the system call of the second application program;Then request message is sent to be positioned at system core by the first application program The service processes of central layer, is performed system call by service processes, and by service processes according to the mark of the second application program Execution result returns to the second application program, and wherein, service processes is pre-set in system core layer.It can be seen that the After one application program obtains the request message that the second application program accesses system command, can be sent to be positioned at system by request message The service processes of core layer, is performed the system call of the second application program carried in request message by service processes, and By service processes, execution result returned to the second application program, thus realize the indirect calling system order of the second application program also Obtain the result of calling system order, and then make the second application program simpler realizing various functional requirement when Change.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing briefly introduce.
The method flow schematic diagram of a kind of application call system command that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 applies journey by legitimate signature list to allow calling system order second for what the embodiment of the present invention provided The checking schematic flow sheet of sequence;
The service processes that Fig. 3 provides for the embodiment of the present invention is illustrated based on flow process performed on the basis of communication link Figure;
The structural representation of terminal W that Fig. 4 provides for the embodiment of the present invention;
Fig. 5 passes through the friendship between socket A and the service processes Y of binding for the application program X that the embodiment of the present invention provides Schematic flow sheet mutually;
The apparatus structure schematic diagram of a kind of application call system command that Fig. 6 provides for the embodiment of the present invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and beneficial effect clearer, below in conjunction with accompanying drawing and enforcement Example, is further elaborated to the present invention.Should be appreciated that specific embodiment described herein is only in order to explain this Bright, it is not intended to limit the present invention.
It should be noted that the first application program in the embodiment of the present invention and the second application program differ, second Application program can be any one application program in system, and the first application program then has acquisition the second application call This call instruction is also sent to be positioned at the function of the service processes of system core layer by the call instruction of system command.
It should be noted that the method for the application call system command that the embodiment of the present invention provides is not limited in should In Android system, the method for every application call system command using the embodiment of the present invention to provide in systems is equal Belong to the scope that the embodiment of the present invention is protected.
Fig. 1 illustrates the method flow of a kind of application call system command that the embodiment of the present invention provides and shows It is intended to, as it is shown in figure 1, this flow process comprises the steps that
S101, the first application program obtain the second application program and access the request message of system command, in this request message Carry mark and the system call of the second application program of the second application program.
The request message that the second application program obtained accesses system command is sent to be positioned at by S102, the first application program The service processes of system core layer, is performed described system call by this service processes, and should according to second by service processes By the mark of program, execution result is returned to the second application program.
Wherein, service processes can be pre-set in system core layer.
Before above-mentioned steps S101, the various orders that the second application program is also accessed by the first application program are examined Survey, when detecting that the second application program accesses system command failure, obtain mark and second application of the second application program The system call of program.
For the safety of safeguards system, security mechanism can be set in systems, can be at systematic difference program frame Prestore legitimate signature list in Ceng, and storage allows the second application program of calling system order in legitimate signature list Signature value, to ensure that the second application program that only signature value is positioned in legitimate signature list just allows calling system order. When system prestores above-mentioned legitimate signature list, and obtain the second application program access system at the first application program After the request message of order, by the checking stream of the legitimate signature list the second application program to allowing calling system order Journey, can be found in Fig. 2.
S201, the first application program obtain the second application program and access the request message of system command, in this request message Carry mark and the system call of the second application program of the second application program.
S202, the first application program, according to the mark of the second application program carried in request message, obtain the second application The signature value of program.
Concrete, the first application program can obtain the second application journey according to the access record of the second application program in system The signature value of sequence, such as, obtains the MD5 value of the second application program, and by the MD5 value obtained and pre-stored in legitimate signature list 's
The legitimate signature list that S203, judgement prestore is whether to exist the signature value of the second application program, if depositing , then go to step S204, otherwise terminate flow process.
Request message is sent to be positioned at the service processes of system core layer, by service processes by S204, the first application program Perform described system call, and according to the mark of the second application program, execution result is returned to second by service processes should Use program.
Preferably, also can pre-set socket (socket) in system Runtime Library layer, and the mark of socket is believed Breath is bound with service processes and the first application program respectively, in order to set up leading between the first application program and service processes Letter link.
On the basis of the communication link between the first application program and service processes, will request at the first application program After message is sent to service processes, the flow process performed by service processes, can be found in Fig. 3.
S301, service processes, from receiving the request message that the first application program sends, carry second in this request message The mark of application program and the system call of the second application program.
Concrete, service processes can wait asking of the first application program transmission to be received by monitoring the port of communication link Seek message.
S302, service processes, according to the system call of the second application program carried in request message, perform described System call, obtains and performs result, and in this execution result, portability has the mark of the second application program.
S303, service processes will be performed performing result by the communication link between the first application program and service processes Result returns to the first application program.
First application program, can be according to perform to carry in result the after receiving the execution result that service processes returns The mark of two application programs, is sent to the second application program by this execution result, indirectly calls realizing the second application program System command.
Below by a specific example, above-mentioned method flow is carried out detailed explanation.
In this example embodiment, application program X, service processes Y, socket A are set in advance in the system of terminal W, and will clothes Business process Y is arranged in the core layer of system, is arranged at by application program X in systematic difference process block rack-layer, by socket A It is arranged in the Runtime Library layer of system, and the identification information of socket A is sent respectively to application program X and service processes Y. Meanwhile, also in systematic difference process block rack-layer, it is previously stored with legitimate signature list 1, is stored in advance in system application The content of the legitimate signature list 1 in ccf layer, can be found in form 1.
Form 1
Legitimate signature list
XXX
YYY
……
Assume the systematic difference program layer of terminal W there is also application program B, application program C and application program D, Then the structural representation of terminal W, can be found in Fig. 4.
It is further assumed that application program B's is designated 111, and assume that application program B needs when realizing certain function to hold Row system call " ping 192.168.3.1 ", owing to system call ping 192.168.3.1 is system command, And application program B does not have the authority performing system command, therefore application program B is performing system call ping 192.168.3.1 can return failed information time, such as, return failed information for " ping 192.168.3.1 is not internal Or external command, it is not the program or autoexec that can run ".
When application program X detects that application program B performs system call " ping 192.168.3.1 " failure, should By program X by the interaction flow between socket A and the service processes Y of binding, can be found in Fig. 5.
S501, application program X, when detecting that application program B accesses system command failure, obtain what application program B sent Request message, carries the mark of application program B and the system command that application program B is to be accessed in this request message.
Wherein, when pre-setting application program X in systems, can the port numbers shared by application program X be sent to should Use program B, to realize the communication between application program B and application program X.
S502, application program X are according to the mark 111 of application program B in request message, and inquiry application B is in systems Access record, according to application program B access record in systems, obtain signature value XXX of application program B.
The legitimate signature that S503, application program X will pre-set in signature value XXX of the application program B of acquisition and system The signature value prestored in list 1 is compared, owing to pre-setting 1 existence signature in legitimate signature list in systems Value XXX, therefore the signature value of application program B is verified by application program X by legitimate signature list 1.
S504, after the signature value of application program B is verified by application program X by legitimate signature list 1, apply journey Sequence X by the mark 111 of application program B and system call " ping 192.168.3.1 " by the socket bound in advance A is sent to service processes Y.
S505, service processes Y call finger in the mark 111 and system receiving the application program B that application program X sends After making " ping 192.168.3.1 ", execution system call " ping 192.168.3.1 ", the execution result of acquisition, can be such as Shown in lower:
" just there are the data of 32 bytes at Ping 192.168.3.1:
Reply from 192.168.3.1: byte=32 time < 1ms TTL=64
192.168.3.1 Ping statistical information:
Packet: send=4, receives=4, loses=0<0% loss>
The estimation time<in units of millisecond>of round trip
The shortest=0ms, the longest=0ms, average=0ms.”
The mark 111 of application program B and the execution result of acquisition are passed through the set bound in advance by S506, service processes Y Meet word A and be sent to application program X.
S507, application program X receive service processes Y send application program B mark 111 and perform result it After, according to the mark of application program B, execution result is sent to application program B.
Application program B, after receiving the execution result that application program X sends, can realize certain function.
It should be noted that terminal W in the example above, may point to user and setting of voice and/or data connectivity is provided Standby (device), including wireless terminal or catv terminal.Wireless terminal can be have wireless connecting function portable equipment, Or it is connected to other processing equipments of radio modem, communicate through wireless access network and one or more core net Mobile terminal.Such as, wireless terminal can be mobile phone (or being referred to as " honeycomb " phone) and the computer with mobile terminal. And for example, wireless terminal can also be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device.
According to the above it can be seen that obtain the second application program at the first application program to access the request of system command After message, request message can be sent to be positioned at the service processes of system core layer by the first application program, service processes perform The system call of the second application program carried in request message, and by service processes, executions result is returned to second and answer By program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then making Second application program simplerization realizing various functional requirement when.Simultaneously as be provided with safe machine in systems System, thus can also avoid risk, safeguards system safety.
Based on identical technology design, the embodiment of the present invention also provides for the device of a kind of application call system command, As shown in Figure 6, this device comprises the steps that
Acquisition module 601, accesses the request message of system command, in described request message for obtaining the second application program Carry mark and the system call of the second application program of the second application program;
Processing module 602, for being sent to be positioned at the service processes of system core layer, described service by described request message Process performs described system call, and according to the mark of described second application program, execution result is returned to described second Application program, described service processes is pre-set in system core layer.
It is also preferred that the left acquisition module 601, it is additionally operable to:
Before obtaining the request message of the second application program access system command, when described second application program being detected When accessing system command failure, the system of the mark and described second application program that obtain described second application program calls finger Order.
It is also preferred that the left
Acquisition module 601, is additionally operable to after obtaining the request message of the second application program access system command, according to institute State the mark of the second application program carried in request message, obtain the signature value of described second application program;
Processing module 602, is additionally operable to the signature value judging whether there is described second application program in legitimate signature list, If existing, then described request message is sent to described service processes;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order, And described legitimate signature list is pre-stored within system application ccf layer.
It is also preferred that the left processing module 602, specifically for:
Described request message is sent in described first application program be positioned at by described first application program by socket The service processes of system core layer, described socket is pre-set at system Runtime Library layer.
It is also preferred that the left processing module 602, specifically for:
The identification information of described socket is bound with described service processes and described first application program respectively, with Set up described first application program and described service processes communication link;
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described according to the mark of described second application program by described first application program Two application programs.
It can be seen from the above: the request obtaining the second application program access system command at the first application program disappears After breath, request message can be sent to be positioned at the service processes of system core layer by the first application program, service processes performing please Seek the system call of the second application program carried in message, and by service processes, execution result is returned to the second application Program, thus realize the second application program indirect calling system order and obtain the result of calling system order, and then make Two application programs simplerization realizing various functional requirement when.Simultaneously as be provided with security mechanism in systems, Thus can also avoid risk, safeguards system safety.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method or computer program. Therefore, the embodiment in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware Form.And, the present invention can use can be with depositing at one or more computers wherein including computer usable program code The shape of the upper computer program implemented of storage media (including but not limited to disk memory, CD-ROM, optical memory etc.) Formula.
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one The step of the function specified in individual square frame or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and amendment to these embodiments.So, claims are intended to be construed to include excellent Select embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and the modification essence without deviating from the present invention to the present invention God and scope.So, if these amendments of the present invention and modification belong to the scope of the claims in the present invention and equivalent technologies thereof Within, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. the method for an application call system command, it is characterised in that including:
First application program obtains the second application program and accesses the request message of system command, carries the in described request message The mark of two application programs and the system call of the second application program;
Described request message is sent to be positioned at the service processes of system core layer, described service processes by described first application program Perform described system call, and according to the mark of described second application program, execution result returned to described second application Program, described service processes is pre-set in system core layer.
2. the method for claim 1, it is characterised in that obtain the second application program at described first application program and access Before the request message of system command, also include:
Described first application program is when detecting that described second application program accesses system command failure, and obtaining described second should With mark and the system call of described second application program of program.
3. the method for claim 1, it is characterised in that obtain the second application program at described first application program and access After the request message of system command, also include:
Described first application program, according to the mark according to the second application program carried in described request message, obtains described The signature value of two application programs;
Judge whether the legitimate signature list of described first application program exists the signature value of described second application program, if depositing , described request message is sent to described service processes by described first application program;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order, and institute State legitimate signature list to be pre-stored within system application ccf layer.
4. the method as described in claims 1 to 3 any one claim, it is characterised in that described first application program is by institute State request message and be sent to described first application program is positioned at the service processes of system core layer, including:
Described request message is sent in described first application program be positioned at system by described first application program by socket The service processes of core layer, described socket is pre-set at system Runtime Library layer.
5. method as claimed in claim 4, it is characterised in that described request message is passed through socket by described first application program Word is sent to be positioned in described first application program the service processes of system core layer, including:
The identification information of described socket is bound with described service processes and described first application program respectively, to set up Described first application program and described service processes communication link;
Execution result is returned to described second application program by the described mark according to described second application program, including:
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described second according to the mark of described second application program by described first application program should Use program.
6. the device of an application call system command, it is characterised in that including:
Acquisition module, accesses the request message of system command, carries in described request message for obtaining the second application program The mark of the second application program and the system call of the second application program;
Processing module, for being sent to be positioned at the service processes of system core layer by described request message, described service processes is held The described system call of row, and according to the mark of described second application program, executions result is returned to described second and apply journey Sequence, described service processes is pre-set in system core layer.
7. device as claimed in claim 6, it is characterised in that described acquisition module, is additionally operable to:
Before obtaining the request message of the second application program access system command, when detecting that described second application program accesses During system command failure, obtain mark and the system call of described second application program of described second application program.
8. device as claimed in claim 6, it is characterised in that
Described acquisition module, is additionally operable to after obtaining the request message of the second application program access system command, according to described The mark of the second application program carried in request message, obtains the signature value of described second application program;
Described processing module, is additionally operable to the signature value judging whether there is described second application program in legitimate signature list, if Exist, then described request message is sent to described service processes;
Wherein, described legitimate signature list stores the signature value of the second application program allowing calling system order, and institute State legitimate signature list to be pre-stored within system application ccf layer.
9. the device as described in claim 6~8 any one claim, it is characterised in that described processing module, specifically uses In:
Described request message is sent in described first application program be positioned at system by described first application program by socket The service processes of core layer, described socket is pre-set at system Runtime Library layer.
10. device as claimed in claim 9, it is characterised in that described processing module, specifically for:
The identification information of described socket is bound with described service processes and described first application program respectively, to set up Described first application program and described service processes communication link;
Described execution result is sent to described first application program by described communication link by described service processes;
Described execution result is sent to described second according to the mark of described second application program by described first application program should Use program.
CN201610620579.0A 2016-08-01 2016-08-01 Method and device for calling system command Active CN106293962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610620579.0A CN106293962B (en) 2016-08-01 2016-08-01 Method and device for calling system command

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610620579.0A CN106293962B (en) 2016-08-01 2016-08-01 Method and device for calling system command

Publications (2)

Publication Number Publication Date
CN106293962A true CN106293962A (en) 2017-01-04
CN106293962B CN106293962B (en) 2019-12-20

Family

ID=57663773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610620579.0A Active CN106293962B (en) 2016-08-01 2016-08-01 Method and device for calling system command

Country Status (1)

Country Link
CN (1) CN106293962B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107068150A (en) * 2017-05-03 2017-08-18 安利军 A kind of Android intelligent sounds control method and system
CN107145390A (en) * 2017-04-10 2017-09-08 北京智能管家科技有限公司 Android service lifecycle management method, service management object and Android system
CN113326067A (en) * 2021-05-11 2021-08-31 深圳市捷视飞通科技股份有限公司 Command execution method, system, computer device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034811A (en) * 2011-09-29 2013-04-10 北大方正集团有限公司 File processing method and system and device
CN103514395A (en) * 2012-06-20 2014-01-15 阿里巴巴集团控股有限公司 Plug-in right control method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034811A (en) * 2011-09-29 2013-04-10 北大方正集团有限公司 File processing method and system and device
CN103514395A (en) * 2012-06-20 2014-01-15 阿里巴巴集团控股有限公司 Plug-in right control method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145390A (en) * 2017-04-10 2017-09-08 北京智能管家科技有限公司 Android service lifecycle management method, service management object and Android system
CN107145390B (en) * 2017-04-10 2019-11-19 北京儒博科技有限公司 Android service lifecycle management method, service management object-based device and Android system
CN107068150A (en) * 2017-05-03 2017-08-18 安利军 A kind of Android intelligent sounds control method and system
CN113326067A (en) * 2021-05-11 2021-08-31 深圳市捷视飞通科技股份有限公司 Command execution method, system, computer device and storage medium
CN113326067B (en) * 2021-05-11 2024-02-06 深圳市捷视飞通科技股份有限公司 Command execution method, system, computer device and storage medium

Also Published As

Publication number Publication date
CN106293962B (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN1852094B (en) Method and system for protecting account of network business user
CN104767713B (en) Account binding method, server and system
CN108009825A (en) A kind of identity management system and method based on block chain technology
CN104378342A (en) Multi-account verification method, device and system
CN108512870A (en) Access method, platform of internet of things and the internet of things equipment of platform of internet of things
CN106878250B (en) Cross-application single-state login method and device
CN104917749A (en) Account registration method and device
CN104753677A (en) Password hierarchical control method and system
CN111176794A (en) Container management method and device and readable storage medium
CN107888589A (en) A kind of method and its system for calling trusted application
CN105933374A (en) Mobile terminal data backup method, system and mobile terminal
CN106293962A (en) A kind of method and apparatus of calling system order
CN103716400A (en) Method and system for achieving mobile working based on virtual machine
CN102801728B (en) The management method of automatic login of client side and system
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
CN105577621B (en) Business operation verification method, device and system
US20150154510A1 (en) Electronic device
CN116318911A (en) Domain name access method and device, electronic equipment and storage medium
US8707330B2 (en) Method and system for controlled communication between applications
CN112543194B (en) Mobile terminal login method and device, computer equipment and storage medium
CN109743237B (en) Authentication method of APP and gateway
JP2023521901A (en) Mobile application forgery/falsification detection method, computer program, computer-readable recording medium and computer device using user identifier and signature collection
CN115941217A (en) Method for secure communication and related product
CN112637167A (en) System login method and device, computer equipment and storage medium
CN106557372B (en) Application sharing method and device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant